Applying a zero-trust approach while working from home
By now, many companies have accepted that working from home and remote working are likely to become the new ‘normal’. But that doesn’t necessarily mean their network and systems [...]
IGA: managing and reducing user access risks
Understanding and being able to measure risk is the first step toward reducing it. For many organisations, the most significant internal risk comes from the vast number of sensitive [...]
Zero trust: enabling business continuity and security during a pandemic
From business owners and management staff to IT support and security teams, more people than ever are now working from home due to the coronavirus outbreak. As a result, [...]
The coronavirus threat: beware of increased cyber-attacks
Across the country, parents are juggling working from home and home-schooling. Equally, companies are facing the prospect of functioning with skeleton teams and limited resources, including important IT support [...]
Highlights from the 2020 RSA Conference
Last month, we attended the RSA Conference in San Francisco — like we’ve done the past few years. Although this year was a little different... The trade show was [...]
Private property: no phishing
‘Phishing’ has been around for decades now. America Online (AOL) first flagged an algorithm-based phishing concept in the 1990s, which generated random credit card numbers to match with original cards [...]
How does cyber-crime affect our society?
Over the past decade, technology has advanced significantly to create the highly digital world we now live in. As a result of these developments, the conversations around cyber-crime (and, [...]
Mobile phones: the key to your company’s data
Thanks to today’s impressively powerful processing, mobile phones are being used in business more than ever before. Whether employees are working from company-issued phones or have been granted high-level access from [...]
Cyber security trends to look out for in 2020
In today’s hyper-connected world, where massive amounts of data are created every single day, there is no doubt cyber security will remain a top priority for organisations across all [...]
The dark truth of insider threat
In any business, we inherently want to trust the people we work with. By and large, we can. However, the reality is that insiders remain one of the main [...]
Leveraging advanced threat detection to fend off attacks
Over the last three or so years, North Korea is reported to have stolen an estimated $2 billion through cyber-attacks targeting cryptocurrency exchanges and banks. Lazarus Group, which is [...]
Famous cyber-attacks: the who, what and how
Data breaches and cyber-attacks happen daily. These attacks are often fairly mundane, resulting in temporary loss of productivity and new measures being put in place to prevent future incidents. [...]
The perfect crime: don’t fall victim to identity theft
By now, businesses are well aware of the standard cyber security protocols surrounding passwords, the importance of sharing data securely and so on. Yet, identity theft and fraud are [...]
Assure your projects to reduce risk
When it comes to juggling multiple projects, there are a number of different things for managers to consider including budgets, timings and, crucially, security. Any changes within the project [...]